<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD can't reach the internet or the router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777916#M1097949</link>
    <description>&lt;P&gt;See&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176787iFE528713DF2AAE26/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD.PNG" alt="FTD.PNG" /&gt;&lt;/span&gt; the attachment pls, these are the outputs&lt;/P&gt;</description>
    <pubDate>Sat, 18 Feb 2023 13:49:16 GMT</pubDate>
    <dc:creator>moha27med</dc:creator>
    <dc:date>2023-02-18T13:49:16Z</dc:date>
    <item>
      <title>FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777573#M1097919</link>
      <description>&lt;P&gt;Hello Guys&lt;BR /&gt;I made this Lab in Gns3 to prepare myself for my CCNP Security exam&lt;BR /&gt;Everything work fine, I configure the FTD through FMC, I gave IPs for outside &amp;amp; inside interfaces&lt;BR /&gt;also, I have configured NAT and Static route, the issue is that FTD can't reach the internet (&lt;STRONG&gt;so I can't ping to 192.168.122.1&lt;/STRONG&gt;)&lt;BR /&gt;really I don't know what is the problem, maybe could someone help me&lt;BR /&gt;&lt;BR /&gt;UPDATE: there is no Problem with INTERNET ISP, I have tested with router and PC is&amp;nbsp;pingable&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777573#M1097919</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-18T13:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777613#M1097920</link>
      <description>&lt;P&gt;I think thr issue is in NAT cloud not in FTD.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 18:05:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777613#M1097920</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-17T18:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777634#M1097922</link>
      <description>&lt;P&gt;You do not state how you tested. Regardless of any configuration problem in access-control, routing and NAT, you should be able to ping the next hop from the FTD itself.&lt;/P&gt;
&lt;P&gt;Try if that works and if not, post the output of:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show int ip brief
show run route
show route
show arp&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 17 Feb 2023 18:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777634#M1097922</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-02-17T18:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777895#M1097946</link>
      <description>&lt;P&gt;I once had this issue, if you configured NAT and the route is fine, you might need to clear the ARP cache with ISP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: Noticing now you mentioned its a lab - in this case forget ISP&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 12:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777895#M1097946</guid>
      <dc:creator>georgipetrov</dc:creator>
      <dc:date>2023-02-18T12:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777911#M1097947</link>
      <description>&lt;P&gt;no cuz i tested the NAT cloud with router and PC, so there are no problems with it&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777911#M1097947</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-18T13:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777914#M1097948</link>
      <description>&lt;P&gt;can I see the route in FTD toward the NAT cloud ? &amp;lt;&amp;lt;- you already share the show route&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;can you use wireshark between FTD and cloud&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;see if the FTD get ARP reply for it ARP request&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777914#M1097948</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-18T13:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777916#M1097949</link>
      <description>&lt;P&gt;See&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176787iFE528713DF2AAE26/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD.PNG" alt="FTD.PNG" /&gt;&lt;/span&gt; the attachment pls, these are the outputs&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777916#M1097949</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-18T13:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777922#M1097950</link>
      <description>&lt;P&gt;How is GNS3 installed?&amp;nbsp; Is it on a Linux, Windows, VM ?&lt;/P&gt;
&lt;P&gt;In either of these cases, my first thought would be that the Host device where GNS3 is running is not sharing its network interface with GNS3.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777922#M1097950</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-18T13:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777923#M1097951</link>
      <description>&lt;P&gt;The config looks good so that you should be able to ping the default gateway from the FTD CLI. But with the ARP table empty it is most likely that you messed up you connection between FTD and Default-Gateway inside of GNS3.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 13:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777923#M1097951</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-02-18T13:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777925#M1097952</link>
      <description>&lt;P&gt;It is on VM, but there is no problem with Network, because i tested already with the router and pc in the lab (can see it beside the diagram)&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 14:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777925#M1097952</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-18T14:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777929#M1097953</link>
      <description>&lt;P&gt;this is the output of Wireshark between FTD and Cloud, it looks lik&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireshark.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176788i86AEBC08C066DDC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireshark.PNG" alt="wireshark.PNG" /&gt;&lt;/span&gt;e there are no connection between, right?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 14:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777929#M1097953</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-18T14:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777930#M1097954</link>
      <description>&lt;P&gt;If you not see ARP reply then simple solution to complete your lab is&amp;nbsp;&lt;BR /&gt;add router between the cloud and FTD&amp;nbsp;&lt;BR /&gt;then confing NATing in router.&amp;nbsp;&lt;BR /&gt;it is some GNS limitation I think&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 14:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777930#M1097954</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-18T14:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777941#M1097956</link>
      <description>&lt;P&gt;I am not saying there is a problem with the network, I am saying there is a problem between GNS3 and the host interface.&amp;nbsp; Have you tried assigning the virtual interface to a virtual PC on the VMware host and test from it?&amp;nbsp; I suspect that this will also not work.&lt;/P&gt;
&lt;P&gt;But you say that this is VMware, is there a switch between the VMware host and 192.168.122.1?&amp;nbsp; If yes how is the switch port configured (trunk, access-port)?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 14:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777941#M1097956</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-18T14:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777943#M1097957</link>
      <description>&lt;P&gt;no there is but the arp is missing.&amp;nbsp;&lt;BR /&gt;please use workaround as I write below and check again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 14:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4777943#M1097957</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-18T14:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778489#M1097991</link>
      <description>&lt;P&gt;I found the Problem, the issue in FW FTD, it can't ping to all direction also to Inside and DMZ.&lt;BR /&gt;There is a ping between Router and Internet,&lt;BR /&gt;but i still don't know why the FW doesn't ping at all, I check the ACL, but there are no restrictions&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 11:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778489#M1097991</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-20T11:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778491#M1097992</link>
      <description>&lt;P&gt;UPDATE!!!&lt;BR /&gt;&lt;SPAN&gt;I found the Problem, the issue in FW FTD, it DOESN'T ping to all direction also to Inside area and DMZ.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;There is a ping between Router and Internet,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;but I still don't know why the FW doesn't ping at all, I check the ACL through FMC, but there are no restrictions;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176861iAEAACF3948E50FD7/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD.PNG" alt="FTD.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 11:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778491#M1097992</guid>
      <dc:creator>moha27med</dc:creator>
      <dc:date>2023-02-20T11:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778503#M1097994</link>
      <description>&lt;H2 id="ariaid-title8" class="title topictitle2"&gt;Configure ICMP Access Rules&lt;/H2&gt;
&lt;SECTION class="body taskbody"&gt;
&lt;SECTION id="task_42BBA666CD604517ADA18B32CA162F62__context_E0E1D2256A3D4E238447BD61044CE1AE" class="section context"&gt;
&lt;SECTION class="sectiondiv"&gt;
&lt;P class="p"&gt;By default, you can send ICMP packets to any interface using either IPv4 or IPv6, with these exceptions:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__d89e22" class="li"&gt;
&lt;P class="p"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;does not respond to ICMP echo requests directed to a broadcast address.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__d89e29" class="li"&gt;
&lt;P class="p"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot send ICMP traffic through an interface to a far interface.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;To protect the device from attacks, you can use ICMP rules to limit ICMP access to interfaces to particular hosts, networks, or ICMP types. ICMP rules function like access rules, where the rules are ordered, and the first rule that matches a packet defines the action.&lt;/P&gt;
&lt;P class="p"&gt;If you configure any ICMP rule for an interface, an implicit deny ICMP rule is added to the end of the ICMP rule list, changing the default behavior. Thus, if you want to simply deny a few message types, you must include a permit any rule at the end of the ICMP rule list to allow the remaining message types.&lt;/P&gt;
&lt;P class="p"&gt;We recommend that you always grant permission for the ICMP unreachable message type (type 3). Denying ICMP unreachable messages disables ICMP path MTU discovery, which can halt IPsec and PPTP traffic. Additionally ICMP packets in IPv6 are used in the IPv6 neighbor discovery process.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;SECTION id="task_42BBA666CD604517ADA18B32CA162F62__prereq_49471A3DFB6143219D368C41826B5A9D" class="section prereq p"&gt;
&lt;SECTION class="tasklabel"&gt;
&lt;H3 class="sectiontitle tasklabel cB_Bold"&gt;Before you begin&lt;/H3&gt;
&lt;/SECTION&gt;
&lt;P class="p"&gt;Ensure that the objects needed in the rules already exist. Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph menucascade"&gt;&lt;SPAN class="ph uicontrol"&gt;Objects&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Object Management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to configure objects. You need network objects that define the desired hosts or networks, and port objects that define the ICMP message types you want to control.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;SECTION class="tasklabel"&gt;
&lt;H3 class="sectiontitle tasklabel cB_Bold"&gt;Procedure&lt;/H3&gt;
&lt;/SECTION&gt;
&lt;HR noshade="noshade" /&gt;
&lt;DIV class="tableContainer"&gt;
&lt;TABLE class="stepTable" border="0"&gt;
&lt;TBODY&gt;
&lt;TR id="task_42BBA666CD604517ADA18B32CA162F62__step_A8BEF67A50084CB58CF58FF9A85ED631" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph menucascade"&gt;&lt;SPAN class="ph uicontrol"&gt;Devices&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Platform Settings&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and create or edit the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;FTD&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;policy.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="task_42BBA666CD604517ADA18B32CA162F62__step_85DE490C84C3425195854546627469EE" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;2&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;ICMP&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="task_42BBA666CD604517ADA18B32CA162F62__step_3A05FD05238642B1A68CAF084337C85D" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;3&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;Configure ICMP rules.&lt;/P&gt;
&lt;OL class="ol substeps" type="a"&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__substep_F40388521D0C414197D1CA38FA97B7FB" class="li substep substepexpand"&gt;
&lt;P class="ph cmd"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to add a new rule, or click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Edit&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to edit an existing rule.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__substep_303D98F5A49D4EDC981BC95CEAC2DE3D" class="li substep substepexpand"&gt;
&lt;P class="ph cmd"&gt;Configure the rule properties:&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;
&lt;UL class="ul"&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_200A7F3D137F45988D0AFB76C06B4A6F" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;Action&lt;/SPAN&gt;—Whether to permit (allow) or deny (drop) matching traffic.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_F3E7B74CA0C74BA6A14FF37F9DEDE6A3" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;ICMP Service&lt;/SPAN&gt;—The port object that identifies the ICMP message type.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_B3935C0B71424DFFBE94807491D4C8FC" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;Network&lt;/SPAN&gt;—The network object that identifies the hosts or networks whose access you are controlling.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_33864024413C4CD9A0EECB56B5CF8B93" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;Security Zones&lt;/SPAN&gt;—Add the zones that contain the interfaces that you are protecting. For interfaces not in a zone, you can type the interface name into the field below the Selected Security Zone list and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Add&lt;/SPAN&gt;. These rules will be applied to a device only if the device includes the selected interfaces or zones.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__substep_2307BD628E0148A18B0950861F3E4F88" class="li substep substepexpand"&gt;
&lt;P class="ph cmd"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;OK&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="task_42BBA666CD604517ADA18B32CA162F62__step_ECAC75385FFD4CA4821EC862A2099F9C" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;4&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;(Optional.) Set rate limits on ICMPv4 Unreachable messages.&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;
&lt;UL class="ul"&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_49DBF2BBA3684B76811B395308A479B2" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;Rate Limit&lt;/SPAN&gt;—&lt;SPAN class="ph"&gt;Sets the rate limit of unreachable messages, between 1 and 100 messages per second. The default is 1 message per second.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="task_42BBA666CD604517ADA18B32CA162F62__li_7509E2ABB7A946A39E336B17D0838A0B" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph uicontrol"&gt;Burst Size&lt;/SPAN&gt;—&lt;SPAN class="ph"&gt;Sets the burst rate, between 1 and 10. This value is not currently used by the system.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR id="task_42BBA666CD604517ADA18B32CA162F62__step_2F1FBABAE0824D4A86A4FF6FBAAC2BD4" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;5&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Save&lt;/SPAN&gt;.&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;
&lt;P class="p"&gt;You can now click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Deploy&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and deploy the policy to assigned devices. The changes are not active until you deploy them.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Mon, 20 Feb 2023 11:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778503#M1097994</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-20T11:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTD can't reach the internet or the router</title>
      <link>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778521#M1097995</link>
      <description>&lt;P&gt;The purpose of the security appliance is to be silent and its not mandatory to respond to each single packet (arp/ip/dhcp) etc.&lt;/P&gt;
&lt;P&gt;Most of the feature of FTD are inherited from ASA. as under the hood FTD is more like LINA and CLISH.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 11:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-can-t-reach-the-internet-or-the-router/m-p/4778521#M1097995</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-02-20T11:48:00Z</dc:date>
    </item>
  </channel>
</rss>

